Invertible watermarking algorithm with detecting locations of malicious manipulation for biometric image authentication

12Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In this paper, we present a new method for authentication of biometric images. Our method uses an invertible watermark that can also detect malicious manipulations simultaneously. While virtually all watermarking schemes introduce a small amount of non-invertible distortion in original biometric images, our new method is invertible in the sense that, if the data is deemed authentic, distortion due to authentication can be removed if it becomes necessary to obtain the original biometric image. This technique provides cryptographic strength when verifying image integrity because the probability of making an undetectable modification to the image can be directly related to a secure cryptographic element, such as a hash function. Also, if the biometric image is manipulated, the positions of intentional manipulation can be clearly identified. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Lim, J., Lee, H., Lee, S., & Kim, J. (2006). Invertible watermarking algorithm with detecting locations of malicious manipulation for biometric image authentication. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3832 LNCS, pp. 763–769). https://doi.org/10.1007/11608288_102

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free